Vulnerabilidad en Best Practical Solutions RT (CVE-2009-4151)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-287
Autenticación incorrecta
Fecha de publicación:
02/12/2009
Última modificación:
09/04/2025
Descripción
Vulnerabilidad de fijación de sesión en /Elements/SetupSessionCookie en Best Practical Solutions RT v3.0.0 a la v3.6.9 y v3.8.x a la v3.8.5, permite a atacantes remotos secuestrar sesiones web manipulando el identificador de sesión lo que permite "Un acceso HTTP al servidor RT". Relacionado con el CVE-2009-3585.
Impacto
Puntuación base 2.0
5.80
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:bestpractical:rt:3.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:rt:3.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:rt:3.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:rt:3.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:rt:3.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:rt:3.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:rt:3.0.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:rt:3.0.7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:rt:3.0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:rt:3.0.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:rt:3.0.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:rt:3.0.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:rt:3.0.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:rt:3.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:rt:3.2.1:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch
- http://bestpractical.typepad.com/files/rt-3.0.1-3.0.6-session_fixation.v3.patch
- http://bestpractical.typepad.com/files/rt-3.0.7-3.6.1-session_fixation.v3.patch
- http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch
- http://bestpractical.typepad.com/files/rt-3.6.4-3.6.9-session_fixation.v2.patch
- http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch
- http://blog.bestpractical.com/2009/11/session-fixation-vulnerability.html
- http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000176.html
- http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000177.html
- http://secunia.com/advisories/37546
- http://secunia.com/advisories/37728
- http://www.securityfocus.com/bid/37162
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54472
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00761.html
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00794.html
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00832.html
- http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch
- http://bestpractical.typepad.com/files/rt-3.0.1-3.0.6-session_fixation.v3.patch
- http://bestpractical.typepad.com/files/rt-3.0.7-3.6.1-session_fixation.v3.patch
- http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch
- http://bestpractical.typepad.com/files/rt-3.6.4-3.6.9-session_fixation.v2.patch
- http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch
- http://blog.bestpractical.com/2009/11/session-fixation-vulnerability.html
- http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000176.html
- http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000177.html
- http://secunia.com/advisories/37546
- http://secunia.com/advisories/37728
- http://www.securityfocus.com/bid/37162
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54472
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00761.html
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00794.html
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00832.html



